CN101714203A - File transparent encryption method for marker file and data file - Google Patents

File transparent encryption method for marker file and data file Download PDF

Info

Publication number
CN101714203A
CN101714203A CN200910188877A CN200910188877A CN101714203A CN 101714203 A CN101714203 A CN 101714203A CN 200910188877 A CN200910188877 A CN 200910188877A CN 200910188877 A CN200910188877 A CN 200910188877A CN 101714203 A CN101714203 A CN 101714203A
Authority
CN
China
Prior art keywords
file
data
disk
encrypted
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910188877A
Other languages
Chinese (zh)
Inventor
胡跃
温耿青
卓勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd filed Critical SHENZHEN HONGAN INFORMATION TECHNOLOGY Co Ltd
Priority to CN200910188877A priority Critical patent/CN101714203A/en
Publication of CN101714203A publication Critical patent/CN101714203A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a file transparent encryption method for a marker file and a data file. The technical scheme comprises the following steps of: (1) setting that all files in one storage position are encrypted; (2) one encrypted marker file exists in a directory in which each encrypted file is, showing that the file is encrypted; (3) when a kernel module intercepts the 'read' action, deciphering the data of a disk; and (4) when the kernel module intercepts the 'write' action, encrypting the data of the disk.

Description

The file transparent encryption method that adopts tab file and data file to combine
Technical field
The file transparent encryption method that adopts tab file and data file to combine is applied to the file data field of encryption, can be used for being encrypted in the file on local hard drive and the mobile memory medium.
Technical background
File encryption becomes an indispensable ingredient of information security just day by day.The WINDOWS system the NTFS system built-in EFS file encryption function.But there is a defective in this encryption function, must use NTFS.If the storage medium in user's the system uses the file system of non-NTFS, then can't support.
The file encryption solution that some application layers realize then exists the problem that each application program is all needed to be special HOOK.And the read-write of some mode can't be supported.
Have now some other transparent encryption solution, but aspect of performance not very satisfactory.
Summary of the invention
Consider existing technical defective, the invention provides one and support various file system, high performance file transparent encryption method.
Concrete step is as follows:
1) with encryption key and need information encrypted to be saved in configuration file;
2) in system start-up, filter Driver on FSD reads key and needs to encrypt from configuration file memory location;
3) after the normal operation of system, the normal instrument that uses oneself of user;
4) intercept application program new files when action in this memory location at kernel module, in the file of setting up one 0 byte, set up a tab file;
5) when kernel module is intercepted application program and is opened file in this memory location, if not then a newly-built tab file, and with original file encryption;
6) when kernel module is intercepted application program and is read file, with the data decryption of reading in the disk;
7) when kernel module is intercepted the application program written document, the data encryption of disk will be write.
Description of drawings
Fig. 1 encryption system initialization flowchart
The normal operational flow diagram of Fig. 2 encryption system
Embodiment
The present invention is applicable to any OS (Operating System) and any file system.But current is being that example is described implementation step with WINDOWSXP only.
In the time of concrete enforcement, need a WINDOWS XP system, the configurator of key and encrypted location, a filter Driver on FSD.Step is as follows:
At first with drive installation on system;
Then key and encrypted location are configured in the registration table;
Restart system;
Filter Driver on FSD loads the configuration information of key and encrypted location;
System normally starts;
Normal oneself application software commonly used of using of user;
The filter Driver on FSD module is tackled user's operation automatically, and does corresponding processing.

Claims (3)

1. the file transparent encryption method that adopts tab file and data file to combine, its feature is as follows:
Two files, one is the ciphered data file, another is the encrypted indicia file;
When opening for the first time, set up tab file, and with file encryption;
During new files, set up tab file;
When opening later on, just can determine according to tab file whether this file is encrypted;
To write the data encryption of disk, will read the data decryption of disk.
2. the feature of two files is as follows:
One is ciphered data file, and one is the encrypted indicia file;
The user can see data file, and encrypt file is hidden.
3. with data encryption, will read the data decryption of disk, be characterised in that:
The data encryption of disk will be write;
The data decryption of disk will be read;
Other IO are without any need for special processing.
CN200910188877A 2009-12-16 2009-12-16 File transparent encryption method for marker file and data file Pending CN101714203A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910188877A CN101714203A (en) 2009-12-16 2009-12-16 File transparent encryption method for marker file and data file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910188877A CN101714203A (en) 2009-12-16 2009-12-16 File transparent encryption method for marker file and data file

Publications (1)

Publication Number Publication Date
CN101714203A true CN101714203A (en) 2010-05-26

Family

ID=42417844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910188877A Pending CN101714203A (en) 2009-12-16 2009-12-16 File transparent encryption method for marker file and data file

Country Status (1)

Country Link
CN (1) CN101714203A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125742A (en) * 2018-10-30 2020-05-08 奇酷互联网络科技(深圳)有限公司 File management method, intelligent terminal and device with storage function

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125742A (en) * 2018-10-30 2020-05-08 奇酷互联网络科技(深圳)有限公司 File management method, intelligent terminal and device with storage function
CN111125742B (en) * 2018-10-30 2024-04-05 奇酷互联网络科技(深圳)有限公司 File management method, intelligent terminal and device with storage function

Similar Documents

Publication Publication Date Title
US9866374B2 (en) Computer programs, secret management methods and systems
US20060190722A1 (en) Reading at least one locked, encrypted or locked, unencrypted computer file
US20090164709A1 (en) Secure storage devices and methods of managing secure storage devices
CN112269547B (en) Active and controllable hard disk data deleting method and device without operating system
WO2011041128A2 (en) Authentication and securing of write-once, read-many (worm) memory devices
CN103617399A (en) Data file protecting method and device
US7577809B2 (en) Content control systems and methods
JPWO2014167721A1 (en) Data erasing device, data erasing method, program, and storage medium
CN107729777A (en) A kind of safety encryption solid-state storage method
WO2012094969A1 (en) Data protection method and apparatus
WO2007091652A1 (en) Tally information management method and management device
CN101021793B (en) Method and system for realizing Pre-OS Application utilizing extended BIOS technique
JP4516598B2 (en) How to control document copying
JP2007148466A (en) Portable storage device and os
JP4767619B2 (en) External storage device and SBC control method
Huber et al. A flexible framework for mobile device forensics based on cold boot attacks
CN110673863B (en) Intelligent lock system supporting pluggable external storage and intelligent upgrading method
CN110826099A (en) Safe storage method and system suitable for embedded real-time operating system
CN101714203A (en) File transparent encryption method for marker file and data file
CN113302598B (en) Electronic data management device, electronic data management system, and method used therefor
KR101629740B1 (en) Apparatus and Method of Information Storage with Independent Operating System
KR20080088911A (en) New data storage card, interface device and method by memory's bad pattern
CN105844151B (en) File storage protection implementation method and system
CN112434285B (en) File management method, device, electronic equipment and storage medium
JP5983939B2 (en) Information processing apparatus and information processing program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100526